Error control codes for parallel asymmetric channels

Size: px
Start display at page:

Download "Error control codes for parallel asymmetric channels"

Transcription

1 Error control codes for parallel asymmetric channels R. Ahlswede and H. Aydinian Department of Mathematics University of Bielefeld POB D Bielefeld, Germany addresses: Abstract We introduce and study error correcting codes for parallel synchronous communication via asymmetric channels. Constructions for error detecting/correcting codes are presented. More generally, we consider array codes for binary asymmetric channels. Index Terms Asymmetric error correcting codes, parallel channel, asymmetric parallel channel, array codes The author was supported by the Finite Structures Marie Curie Host Fellowship for the Transfer of knowledge project carried out by Alfred Renyi Institute of Mathematics, in the framework of the European Community s Structuring the European Research Area programme. 1

2 1 Introduction In [1] the notion of parallel error correcting codes was introduced. A communication channel (multiple access channel) consists of several sub channels transmitting simultaneously and synchronously. Informally, the senders of a multiple access channel encode their messages to the codewords c i (of the same length over the same alphabet X, say X = Z q ) and transmit in parallel the codewords. The errors in the channel are of the additive type and for all transmitted codewords c i the received vectors are of the form c i +e (in the presence of noise) where e is an error vector. In particular, for two users let X = Z q and let C X n X n. C is called a parallel t-error correcting code of length n, if (u,v) + (e,e) (u,v ) + (e,e ) for every pair of distinct codewords (u,v), (u,v ) C and any vectors e,e Z n q each of Hamming weight at most t. A motivation for studying such codes is explained in [1]. In many digital systems such as fiber optical communications and optical disks the ratio between probability of errors of type 1 0 and 0 1 can be large. Practically we can assume that only one type of errors can occur in those systems. These errors are called asymmetric. Thus the binary asymmetric channel has the property that a transmitted 1 is always received correctly but a transmitted 0 may be received as a 0 or 1. In this paper we introduce and study parallel error correcting/detecting codes for binary asymmetric channels. We consider a parallel asymmetric channel of r senders and block length n over the binary alphabet. A message of senders s 1,...,s r is represented by the r n (0, 1) matrix with the i-th row corresponding to the message of s i. Thus a code C, called (r n) code, is viewed as a set of r n (0, 1) matrices. We consider the errors of type 0 1. We say that t errors have occured in a transmitted matrix M, also called codeword, if in some t columns of M all zero entries transfered to ones. In other words, the received word M can be considered as M = M E, where the error word E is an r n matrix with each column consisting of all-ones or all-zeros and means the Boolean sum of matrices. The weight w(e) is the number of all-one columns in E. We say that an (r n) code C is capable of correcting t asymmetric errors if any transmitted codeword can be uniquely reconstructed at the receiving end in a presence of t or less errors. In other words, for any two codewords M 1,M 2 and error words E 1,E 2 of weight not greater than t we have M 1 E 1 M 2 E 2. (1.1) We also say that C is capable of detecting t errors if there are no codewords M 1,M 2 such that M 1 E = M 2 with w(e) t. Such a code is called t error correcting/detecting asymmetric parallel code (shortly (r n,t) AP code). 2 Construction of error detecting/correcting AP codes. For an r n (0, 1)-matrix M the columns of M can be viewed as elements of the alphabet Q = {0, 1,...,q 1} (q = 2 r ) using arbitrary one-to-one mapping ϕ : {0, 1} r Q. Thus any 2

3 matrix M can be represented as an n-tuple (a 1,...,a n ) Q n. A natural way is to consider each column as the binary expansion of the corresponding number from Q. Our parallel channel can be illustrated now as a q-ary asymmetric channel ( called q ary AP channel) with q = 2 r shown in Figure 1. q-1 q Figure 1: q ary AP channel Thus AP channel is a special case of the q ary channel, shown in Figure 1, when q = 2 r. Therefore in general it makes sense to study this channel for arbitrary q (for other models of q-ary asymmetric channels see [2]). The notion of t error correcting/detecting code is extended to any q ary AP channel in a natural way. We call such codes q ary t error correcting/detecting AP codes. In the sequel sometimes we will not specify q. Let us consider now the following partial ordering on Q n. For a n = (a 1,...,a n ), b n = (b 1,...,b n ) Q n we say that a n b n if either a i = b i or a i = q 1 for i = 1,...,n. The weight of an element a n Q n is defined by w(a n ) = {i : a i = q 1}. Thus Q n is a partially ordered set ordered by denoted by S(n,q). In the literature S(n,q) is known (see [8]) as star product. A S(n,q) is called an antichain if any two distinct members of A are incomparable. Let S i (n,q) be the set of all elements of S(n,q) with weight i and denote W i = S i (n,q). Proposition 1 Let A S(n,q). Then the following two conditions are equivalent (i) A is a q ary AP code capable of detecting all errors. (ii) A is an antichain in S(n,q). Proof. The equivalence directly follows from the definitions of antichain and error detection capability. Theorem 1 Given integers n,r 1 and 1 t < n let W k = max{w i : 0 i n}. Then (i) S k (n,q) is an optimal q ary AP code capable of detecting all errors. (ii) the code C defined by is a q ary AP code capable of detecting t errors. C = {x S i (n,q) : i k mod (t + 1)} (2.1) 3

4 Proof. Clearly S i (n,q) is an antichain. It is known also (see [8]) that the maximum size of an antichain in S(n,q) is equal to max{w i : 0 i n}. This with Proposition 1 implies (i). For (ii) it suffices to show that any a n S i (n,q) and b n S i+t+1 (n,q) with a n b n satisfy the condition of t-error detection capability. This is clear since a n b n implies that there exist coordinates i 1,...,i t+1 such that a i1 = = a it+1 = q 1 and b i1,...,b it+1 q 1. Note that the size of the described code C > 2nr t + 1. (2.2) This follows from the unimodality of {W i }, that is W 0 < W 1 <... W k W k+1 >... > W n. Next we consider error correcting AP codes. But first we define a distance d A between elements of Q n. To this end we define two distances d 0 and d 1 between a n,b n Q n. Let d 0 (a n,b n ) := #{i : a i b i and a i,b i q 1} and let d 1 (a n,b n ) := max{δ(a n,b n ),δ(b n,a n )}, where δ(a n,b n ) := #{i : a i b i and a i = q 1}, δ(b n,a n ) := #{j : a j b j and b j = q 1}. Definition. For a n,b n Q n the distance d A (a n,b n ) is defined by The following is easy to verify. d A (a n,b n ) = d 0 (a n,b n ) + d 1 (a n,b n ). Proposition 2 A q ary AP-code C is capable of correcting t errors iff for every distinct a n,b n C holds d A (a n,b n ) t + 1. We construct now single-error correcting AP codes. Note that for n q+1 (and prime power q) we can use for this purpose MDS codes (see [11], Ch.11) with the minimum Hamming distance 3 and cardinality q n 2. However, one can do it better. Proposition 3 For arbitrary q the code C Q n defined by n 1 C = {(x 1,...,x n ) S 0 (n,q) : x n = x i mod q 1} (2.3) is a single error correcting AP code with C = (q 1) n 1. Proof. By the construction we have C = S 0 (n,q) = (q 1) n 1. It is also clear that the minimum distance d A of the code is 2. One can extend the construction to t-error correcting AP codes. In view of Proposition 2 it is sufficient to construct a code C of length n and minimum Hamming distance t + 1 over alphabet Q = {0, 1,...,q 2}. 4

5 Lemma 1 For any prime power q and n q + 1 there exists a code C Q n of minimum Hamming distance d with (q 1)n C. (2.4) q d 1 Proof. There exists an MDS code C GF(q) n with minimum Hamming distance d and C = q n d+1. Let now C Q n be an optimal code with minimum distance d. We use the following known result, the idea of which is due to P. Elias (a proof can be found in [10]). Lemma 2 (see [10]) For any subsets A,B Z n q there exists x Z n q such that (x + A) B A B q n. To obtain (2.4) we identify B with Q and C with A. Clearly Lemma 1 with Proposition 2 in particular implies the following Proposition 4 For n < 2 r one can construct an (n r) AP code C, capable of correcting 1 t < n errors, with C (2r 1) n 2 rt. It should be mentioned that the described codes can be viewed as codes correcting erasures with the erasure symbol is q 1 ( for definition see [7]). Next we give a construction of single error correcting (r n, 1) AP codes for any r and n. In [13] Varshamov and Tennengolts gave the first construction of nonlinear codes correcting asymmetric errors. Given n N and an integer a, the Varshamov Tennengolts code (VT code ) C(n,a) is defined by { } n C(n,a) = (x 1,...,x n ) {0, 1} n : ix i a mod m (2.5) where m n + 1 is an integer. It was shown that the code C(n,a) is capable of correcting any single asymmetric error. Moreover, taking m = n + 1 there exists a {0,...,n} such that C(n,a) 2n n + 1, (2.6) thus exceeding the Hamming upper bound for the size of a binary single symmetric error correcting codes. Varshamov [12] showed that C(n, 0) C(n,a). VT codes can be used for construction of q ary single error correcting PA codes. Construction Let C(n,a) be a VT code and let v C(n,a) be a codeword of weight n k. Suppose w.l.o.g. v = (0,...,0, 1,...,1). Let also D(k, 2) be a code of length k and minimum Hamming 5

6 distance 2 over Q = {0, 1,...,q 2} (q = 2 r ). In particular given α Q let D α (k, 2) be the code defined by We define now k 1 D α (k, 2) = {(x 1,...,x k ) Q k : x k = x i + α mod (q 1)}. (2.7) S v (n,a,α) = {(a 1,...,a k,q 1,...,q 1) Q n : (a 1,...,a k ) D α (k, 2) (2.8) Similarly for every x C(n,a) define S x (n,a,α). Clearly S x (n,a,α) is a single error correcting AP code. Observe also that for distinct x and y and every v n S x (n,a,α) and u n S y (n,a,α) the minimum distance d A (u n,v n ) 2. Thus S(n,a,α) := x C(n,a) S x(n,a,α) is q ary AP code capable of correcting all single errors. Let A 0 (n,a),a 1 (n,a),...,a n (n,a) be the weight distribution of C(n,a) (that is A i (n,a) := # {codewords of weight i}). Then it can be easily seen that S(n,a,α) = n A i(n,a) (q 1) n i 1. Thus we have proved the following Theorem 2 For integers q,n 2; 0 a n and 0 α q, the code S(n,a,α) is q ary single error correcting AP code with S(n,a,α) = n A i(n,a) (q 1) n i 1. Note that {S(n,a,α)}, a = 0,...,n; α = 0,...,q 2 is a partition of Q n into (n+1)(q 1) single error correcting AP codes. Therefore max a,α S(n,a,α) qn /(n + 1)(q 1). Corollary 1 For integers n,r 2 there exists a single error correcting (n r, 1) AP code S (described above) with S 2 nr (n + 1)(2 r 1). (2.9) Example. n = 8, r = 2 (q = 4). Let A i be the number of codewords of weight i in the VT code C(8, 0). We have A 0 = A 8 = 1, A 2 = A 6 = 4, A 3 = A 4 = A 5 = 6. Then the construction above gives us a single errorcorrecting (2 8, 1) AP code of size A A A A A A 6 3+A 8 = Note that the size of a single symmetric error correcting code of length 8 (over an alphabet of size 4) is upper bounded (by the Hamming bound) by 2 16 /( ) = Array codes for binary asymmetric channels In general, a binary array code C is a set of r n (0,1) matrices, intended for correction/detection of erroneous bits which can for instance occur only in t rows or only in t columns or in both, in t rows and t columns. Array codes for binary symmetric channels are well studied (see [5] for a good survey ). 6

7 It seems that array codes for asymmetric channels also deserve (from both theoretical and practical points of view) to study. Here we consider the case when errors can occur in t or less columns. Let M(r n) be the set of all r n (0, 1) matrices. We say that C M(r n) is a t error correcting/detecting array code (shortly t AEC/AED array code) if C is capable of correcting all asymmetric errors in t or less columns. Note that any t AEC/AED array code C M(r n) is also a t error correcting/detecting AP code. We discuss first the error detection problem. For two binary sequences a k = (a 1,...,a k ) and b k = (b 1,...,b k ) we say that a k covers b k and write a k b k iff a i b i for i = 1,...,n. Let us also define a partial ordering on M(r n). For A,B M(r n), let h 1,...,h n and g 1,...,g n be the columns of A and B, respectively. We say that A M B iff h i g i for i = 1,...,n. A M(r n) is called an antichain iff any two members of A are incomparable. By definition of asymmetric error detection condition for array codes we have Proposition 5 A M(r n) is a code detecting all asymmetric errors iff A is an antichain. By the classical Sperner theorem (see [8]) it follows that the maximal size of an antichain in M(r n) (with respect to ordering defined above) is ( nr/2 ). Thus the problem of constructing an optimal array code detecting all asymmetric errors is easy. We just take the set of all matrices A M(r n) with the Hamming weight wt H (A) = nr/2, i.e. having nr/2 ones. However, the problem of construction of optimal t-aed codes (given parameters n, r, t) seems to be not so easy. In particular, one can observe that for t = 1 the problem is equivalent to (a special case) of a problem known (in Extremal Set Theory) as n part Sperner problem. However the latter problem is solved only for n = 2 (see [3] or [8]). The following lower bound for the size of a t AED code can be easily verified. Proposition 6 Given integers 1 t n, 1 r let then A is a t AED array code. A = {A M(r n) : wt H (A) nr/2 mod (tr + 1)} (3.1) The lower bound (3,1) appears to be tight for r = 1, that is for usual t AED codes. This was observed in Borden [6]. However, this is not the case in general. Let for example r = n = 3, t = 1. Then the size of the code A defined by (3.1) A = ( 9 0) + ( 9 4) + ( 9 8) = 136. Let now B(w 1,w 2,w 3 ) be the set all X E(3 3) with the i th column (i = 1, 2, 3) having the Hamming weight w i. It is easy to observe that the union of the sets below denoted by B is a 1 AED array code of size B = 144: B(1, 0, 3), B(1, 1, 2), B(1, 2, 1), B(1, 3, 0),B(2, 0, 0), B(2, 1, 1), B(2, 2, 2), B(2, 3, 3) B(0, 0, 1), B(0, 1, 0), B(0, 2, 3), B(0, 3, 2), B(3, 2, 0),B(3, 1, 3), B(3, 2, 0), B(3, 3, 1). 7

8 Let us consider now the error correcting problem for the simplest case t = 1. Every matrix B M(r n), with columns denoted by b 1,..., b n, is associated with the sequence (b 1,...,b n ) where b i (i = 1,...,n) is the binary representation of b i. For a subset S Q n, (Q = {0,...,q 1 = 2 r 1}) we denote by S(r n) M the set of all matrices corresponding to S. We say that there exists a k factorization of Z m ( Z m := Z m \ {0}) if there exists a subset A Z m such that each element of Z m can be uniquely represented as a product i a where i {1,...,k} and a A. Theorem 3 Given integers n,r 2 let m := n(q 1) + 1 (q = 2 r ). Let also there exists a (q 1) factorization of Z m by a subset A = {a 1,...,a n }. For a Z m let B Q n be defined by n B = {(x 1,...,x n ) Q n : a i x i a mod m} (3.2) then B(r n) is a single error correcting array code with B(r n) q n n(q 1) + 1. (3.3) Proof. Assume the opposite. Then there exist two codewords B and C with columns b1,..., b n and c 1,..., c n, such that b i > c i, c j > b j for some i,j {1,...,n}, and b k = c k for all indices k i,j. This clearly means that b i > c i, c j > b j and b k = c k (for all k i,j) for the corresponding sequences (b 1,...,b n ) and (c 1,...,c n ). The latter with (3.2) implies that a i (b i c i ) a j (c j b j ) mod m. However this is a contradiction with the (q 1) factorization of Zm by A = {a 1,...,a n }. The lower bound (3.3) is clear. Example. Let n = 12 and r = 2 (q = 4), thus n(q 1) + 1 = 37. One can check that there exists 3 factorization of Z 37 by the set {2, 9, 12, 15, 16, 17, 20, 21, 22, 25, 28, 35}. Therefore, the code B(2 12) defined by (3.2) has cardinality B(2 12) 4 12 /37 exceeding the Hamming bound for a quaternary single symmetric error correcting code of length 12. We give now a construction of single-error correcting array codes with a very simple decoding algorithm. Construction For integers 1 < r n let E(r n) denote the set of all r n (0, 1)-matrices with even row weights. Thus E = 2 (n 1)r. For an r n (0, 1)-matrix M let h i (M) be the Hamming weight of its i-th column. Let also p be the smallest prime such that p n + 1. We define now the code C(r n) as follows. C(r n) = {M E : n ih i (M) a mod p}. (3.4) Theorem 4 (i) C(r n) is capable of correcting all asymmetric errors in a single column. 8

9 (ii) There exists 0 a p 1 such that C(r n) 2(n 1)r. (3.5) p Proof. Only part (i) is needed to argue. Let M be a received word and let (ε 1,...,ε r ) T be the sum of all columns of M where ε i is taken modulo 2, that is, (ε 1,...,ε r ) is the parity check of the rows of M. Then the nonzero coordinates ε i1,...,ε it indicate that the errors occur in the rows i 1,...,i t. Suppose now there are two codewords M 1,M 2 such that the addition of (ε 1,...,ε r ) T to the i-th column of M 1 and j-th column of M 2 (i j) results in M. Then in view of (3.4) we have n ih i (M M 1 ) n ih i (M M 2 ) mod p which implies that it jt mod p. However this is a contradiction since t,i,j < p. Therefore M 1 = M 2 concluding the proof. Decoding algorithm: For a received word M 1. Determine the column vector (ε 1,...,ε r ) T := M (1,...,n) T mod 2. Let w H (ε 1,...,ε r ) = t. If t = 0 then M is a codeword, otherwise 2. Compute b := ih i (M ) mod p. 3. Compute i := b a t mod p. 4. Subtract from the i-th column of M the column vector (ε 1,...,ε r ) T, obtaining the transmitted codeword. 4 Concluding remarks We have considered two models of multiple access parallel asymmetric channels giving constructions of error detecting/correcting codes for that channels. Many problems remain open in this direction: 1. What is the size of an optimal t error detecting AP code? Is the code defined by (2.1) is an optimal t error detecting AP code? 2. What is the size of an optimal t AED array code? 3. Costruction of good t error correcting AP codes and t AED array codes. 4. Nontrivial upper bounds for the size of both classes of codes. We considered array codes for detecting/correcting t column errors. Several natural and interesting models can be considered here. Consider array codes for correction/detection of t 1 column and t 2 row errors. 9

10 It would be also interesting to consider the case when the number of errors in each column (row) is limited. The study of array codes for unidirectional type of errors (see [4] for a collection of papers on error control codes for uniderectional errors) is also seems to be natural. References [1] R. Ahlswede and N. Cai, Parallel error correcting codes, IEEE Trans. Inform. Theory 46, No.4, ,2002. [2] R. Ahlswede, H. Aydinian, L.H. Khachatrian and L.M.G.M. Tolhuizen, On q ary codes coorecting all undirectional errors of a limited magnitude, in Proceedings of Ninth International workshop on Algebraic and Combinatorial Coding Theory, June, Kranevo, Bulgaria, 20 26, [3] I. Anderson, Combinatorics of Finite Sets, Clarendon Press, Oxford, [4] M. Blaum (ed.), Codes for detecting and correcting unidirectional errors, IEEE Computer Society Press Reprint Collections, IEEE Computer Society Press, Los Alamitos, CA, [5] M. Blaum, P. G. Farrell and H. C. A. van Tilborg, Array codes, Handbook of coding theory, Vol. II, pp , (V.S. Pless, W.C. Huffman and R.A. Brualdi (eds), North-Holland, Amsterdam) [6] J.M. Borden, Optimal asymmetric error detecting codes, Information and Control 53, No. 1 2, 66 73, [7] P. Elias, The noisy channel coding theorem for erasure channels, Amer. Math. Monthly 81, , [8] K. Engel, Sperner Theory, Cambridge University Press, [9] T. Kløve, Error correcting codes for the assymetric channel, Report, Dept. of Math. Univ. of Bergen, 1981 (with updated bibliography in 1995). [10] J.H. van Lint, Introduction to Coding Theory, Springer-Verlag, Berlin, [11] F.J. MacWilliams and N.J. Sloane, The Theory of Error-Correcting Codes, New York: North-Holland, [12] R.R. Varshamov, On the theory of assymmetric codes (in Russian), Doklady Akademii Nauk USSR, Vol. 164, , (transl: Soviet Physics-Doklady 10, , 1965). [13] R.R. Varshamov and G.M. Tennengolts, A code which corrects single asymmetric errors (in Russian) Avtomat. Telemeh. 26, , (transl: Automation and Remote Contr., , 1965). 10

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

CLASSICAL error control codes have been designed

CLASSICAL error control codes have been designed IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 56, NO 3, MARCH 2010 979 Optimal, Systematic, q-ary Codes Correcting All Asymmetric and Symmetric Errors of Limited Magnitude Noha Elarief and Bella Bose, Fellow,

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

ERROR-CORRECTING CODES AND LATIN SQUARES

ERROR-CORRECTING CODES AND LATIN SQUARES ERROR-CORRECTING CODES AND LATIN SQUARES Ritu Ahuja Department of Mathematics, Khalsa College for Women, Civil Lines, Ludhiana 141001, Punjab, (India) ABSTRACT Data stored and transmitted in digital form

More information

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE 4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,

More information

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1

More information

A Combinatorial Bound on the List Size

A Combinatorial Bound on the List Size 1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu

More information

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination

More information

On permutation automorphism groups of q-ary Hamming codes

On permutation automorphism groups of q-ary Hamming codes Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 28, Pamporovo, Bulgaria pp. 119-124 On permutation automorphism groups of q-ary Hamming codes Evgeny V. Gorkunov

More information

Optimal Asymmetric Error Detecting Codes

Optimal Asymmetric Error Detecting Codes INFORMATION AND CONTROL 53, 66--73 (1982) Optimal Asymmetric Error Detecting Codes J. MARTIN BORDEN Department of Mathematical Sciences, Worcester Polytechnic Institute, Worcester, Massachusetts 01609

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

The Intersection Theorem for Direct Products

The Intersection Theorem for Direct Products Europ. J. Combinatorics 1998 19, 649 661 Article No. ej9803 The Intersection Theorem for Direct Products R. AHLSWEDE, H.AYDINIAN AND L. H. KHACHATRIAN c 1998 Academic Press 1. INTRODUCTION Before we state

More information

Codes from lattice and related graphs, and permutation decoding

Codes from lattice and related graphs, and permutation decoding Codes from lattice and related graphs, and permutation decoding J. D. Key School of Mathematical Sciences University of KwaZulu-Natal Pietermaritzburg 3209, South Africa B. G. Rodrigues School of Mathematical

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical

More information

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane 2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt

More information

Section 3 Error Correcting Codes (ECC): Fundamentals

Section 3 Error Correcting Codes (ECC): Fundamentals Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum

More information

And for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)

And for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x) Outline Recall: For integers Euclidean algorithm for finding gcd s Extended Euclid for finding multiplicative inverses Extended Euclid for computing Sun-Ze Test for primitive roots And for polynomials

More information

Finite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal

Finite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal Finite Mathematics Nik Ruškuc and Colva M. Roney-Dougal September 19, 2011 Contents 1 Introduction 3 1 About the course............................. 3 2 A review of some algebraic structures.................

More information

An Extremal Doubly Even Self-Dual Code of Length 112

An Extremal Doubly Even Self-Dual Code of Length 112 An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;

More information

Coset Decomposition Method for Decoding Linear Codes

Coset Decomposition Method for Decoding Linear Codes International Journal of Algebra, Vol. 5, 2011, no. 28, 1395-1404 Coset Decomposition Method for Decoding Linear Codes Mohamed Sayed Faculty of Computer Studies Arab Open University P.O. Box: 830 Ardeya

More information

New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting

New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting Hideki Yagi 1, Toshiyasu Matsushima 2, and Shigeichi Hirasawa 2 1 Media Network Center, Waseda University 1-6-1,

More information

Error Correcting Codes: Combinatorics, Algorithms and Applications Spring Homework Due Monday March 23, 2009 in class

Error Correcting Codes: Combinatorics, Algorithms and Applications Spring Homework Due Monday March 23, 2009 in class Error Correcting Codes: Combinatorics, Algorithms and Applications Spring 2009 Homework Due Monday March 23, 2009 in class You can collaborate in groups of up to 3. However, the write-ups must be done

More information

Open Questions in Coding Theory

Open Questions in Coding Theory Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems

More information

ELEC-E7240 Coding Methods L (5 cr)

ELEC-E7240 Coding Methods L (5 cr) Introduction ELEC-E7240 Coding Methods L (5 cr) Patric Östergård Department of Communications and Networking Aalto University School of Electrical Engineering Spring 2017 Patric Östergård (Aalto) ELEC-E7240

More information

Maximum Distance Separable Symbol-Pair Codes

Maximum Distance Separable Symbol-Pair Codes 2012 IEEE International Symposium on Information Theory Proceedings Maximum Distance Separable Symbol-Pair Codes Yeow Meng Chee, Han Mao Kiah, and Chengmin Wang School of Physical and Mathematical Sciences,

More information

On Perfect Codes and Related Concepts

On Perfect Codes and Related Concepts Designs, Codes and Cryptography, 22, 221 237, 2001. c 2001 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. On Perfect Codes and Related Concepts R. AHLSWEDE H.K. AYDINIAN L.H. KHACHATRIAN

More information

Binary Puzzles as an Erasure Decoding Problem

Binary Puzzles as an Erasure Decoding Problem Binary Puzzles as an Erasure Decoding Problem Putranto Hadi Utomo Ruud Pellikaan Eindhoven University of Technology Dept. of Math. and Computer Science PO Box 513. 5600 MB Eindhoven p.h.utomo@tue.nl g.r.pellikaan@tue.nl

More information

Ma/CS 6b Class 24: Error Correcting Codes

Ma/CS 6b Class 24: Error Correcting Codes Ma/CS 6b Class 24: Error Correcting Codes By Adam Sheffer Communicating Over a Noisy Channel Problem. We wish to transmit a message which is composed of 0 s and 1 s, but noise might accidentally flip some

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Self-Dual Codes over Commutative Frobenius Rings

Self-Dual Codes over Commutative Frobenius Rings Self-Dual Codes over Commutative Frobenius Rings Steven T. Dougherty Department of Mathematics University of Scranton Scranton, PA 18510, USA Email: doughertys1@scranton.edu Jon-Lark Kim Department of

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

REED-SOLOMON CODE SYMBOL AVOIDANCE

REED-SOLOMON CODE SYMBOL AVOIDANCE Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University

More information

Rank and Kernel of binary Hadamard codes.

Rank and Kernel of binary Hadamard codes. 1 Rank and Kernel of binary Hadamard codes. K.T. Phelps, J. Rifà Senior Member IEEE, M. Villanueva Abstract In this paper the rank and the dimension of the kernel for (binary) Hadamard codes of length

More information

LIFTED CODES OVER FINITE CHAIN RINGS

LIFTED CODES OVER FINITE CHAIN RINGS Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We

More information

On Computing the Hamming Distance

On Computing the Hamming Distance Acta Cybernetica 16 (2004) 443 449. On Computing the Hamming Distance Gerzson Kéri and Ákos Kisvölcsey Abstract Methods for the fast computation of Hamming distance developed for the case of large number

More information

Hamming Codes 11/17/04

Hamming Codes 11/17/04 Hamming Codes 11/17/04 History In the late 1940 s Richard Hamming recognized that the further evolution of computers required greater reliability, in particular the ability to not only detect errors, but

More information

arxiv: v4 [cs.it] 14 May 2013

arxiv: v4 [cs.it] 14 May 2013 arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University

More information

Extending MDS Codes. T. L. Alderson

Extending MDS Codes. T. L. Alderson Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show

More information

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of

More information

A Short Overview of Orthogonal Arrays

A Short Overview of Orthogonal Arrays A Short Overview of Orthogonal Arrays John Stufken Department of Statistics University of Georgia Isaac Newton Institute September 5, 2011 John Stufken (University of Georgia) Orthogonal Arrays September

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

Hamming codes and simplex codes ( )

Hamming codes and simplex codes ( ) Chapter 6 Hamming codes and simplex codes (2018-03-17) Synopsis. Hamming codes are essentially the first non-trivial family of codes that we shall meet. We start by proving the Distance Theorem for linear

More information

Some Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties

Some Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties Some Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties HONGQUAN XU Department of Statistics, University of California, Los Angeles, CA 90095-1554, U.S.A. (hqxu@stat.ucla.edu)

More information

A diametric theorem for edges. R. Ahlswede and L.H. Khachatrian

A diametric theorem for edges. R. Ahlswede and L.H. Khachatrian A diametric theorem for edges R. Ahlswede and L.H. Khachatrian 1 1 Introduction Whereas there are vertex and edge isoperimetric theorems it went unsaid that diametric theorems are vertex diametric theorems.

More information

Asymmetric binary covering codes

Asymmetric binary covering codes Asymmetric binary covering codes Joshua N Cooper and Robert B Ellis Department of Mathematics, University of California at San Diego, La Jolla, California E-mail: cooper@mathucsdedu, rellis@mathucsdedu

More information

Binary codes from rectangular lattice graphs and permutation decoding

Binary codes from rectangular lattice graphs and permutation decoding Binary codes from rectangular lattice graphs and permutation decoding J. D. Key a,,1 P. Seneviratne a a Department of Mathematical Sciences, Clemson University, Clemson SC 29634, U.S.A. Abstract We examine

More information

Limits to List Decoding Random Codes

Limits to List Decoding Random Codes Limits to List Decoding Random Codes Atri Rudra Department of Computer Science and Engineering, University at Buffalo, The State University of New York, Buffalo, NY, 14620. atri@cse.buffalo.edu Abstract

More information

A multiple access system for disjunctive vector channel

A multiple access system for disjunctive vector channel Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 269 274 A multiple access system for disjunctive vector channel Dmitry Osipov, Alexey

More information

Constructions of digital nets using global function fields

Constructions of digital nets using global function fields ACTA ARITHMETICA 105.3 (2002) Constructions of digital nets using global function fields by Harald Niederreiter (Singapore) and Ferruh Özbudak (Ankara) 1. Introduction. The theory of (t, m, s)-nets and

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................

More information

On the Classification of Splitting (v, u c, ) BIBDs

On the Classification of Splitting (v, u c, ) BIBDs BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 5 Special Thematic Issue on Optimal Codes and Related Topics Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081

More information

Visual Cryptography Schemes with Optimal Pixel Expansion

Visual Cryptography Schemes with Optimal Pixel Expansion Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato and Alfredo De Santis Dipartimento di Informatica ed Applicazioni Università degli Studi di Salerno, 808, Baronissi

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

Extended Binary Linear Codes from Legendre Sequences

Extended Binary Linear Codes from Legendre Sequences Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of

More information

IBM Research Report. Construction of PMDS and SD Codes Extending RAID 5

IBM Research Report. Construction of PMDS and SD Codes Extending RAID 5 RJ10504 (ALM1303-010) March 15, 2013 Computer Science IBM Research Report Construction of PMDS and SD Codes Extending RAID 5 Mario Blaum IBM Research Division Almaden Research Center 650 Harry Road San

More information

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often

More information

Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V.

Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V. Active distances for convolutional codes Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V Published in: IEEE Transactions on Information Theory DOI: 101109/18749009 Published: 1999-01-01

More information

(Reprint of pp in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept , 1990)

(Reprint of pp in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept , 1990) (Reprint of pp. 154-159 in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept. 16-22, 1990) SYSTEMATICITY AND ROTATIONAL INVARIANCE OF CONVOLUTIONAL CODES OVER RINGS

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

Alternant and BCH codes over certain rings

Alternant and BCH codes over certain rings Computational and Applied Mathematics Vol. 22, N. 2, pp. 233 247, 2003 Copyright 2003 SBMAC Alternant and BCH codes over certain rings A.A. ANDRADE 1, J.C. INTERLANDO 1 and R. PALAZZO JR. 2 1 Department

More information

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q)

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) M. Lavrauw L. Storme G. Van de Voorde October 4, 2007 Abstract In this paper, we study the p-ary linear code C k (n, q),

More information

Lecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012

Lecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012 CS 59000 CTT Current Topics in Theoretical CS Oct 4, 01 Lecturer: Elena Grigorescu Lecture 14 Scribe: Selvakumaran Vadivelmurugan 1 Introduction We introduced error-correcting codes and linear codes in

More information

Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming

Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Yuval Filmus April 4, 2017 Abstract The seminal complete intersection theorem of Ahlswede and Khachatrian gives the maximum cardinality of

More information

Codes over Subfields. Chapter Basics

Codes over Subfields. Chapter Basics Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing

More information

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding. Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,

More information

The cocycle lattice of binary matroids

The cocycle lattice of binary matroids Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*

More information

ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR. 1. Introduction

ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR. 1. Introduction ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR SIMEON BALL, AART BLOKHUIS, ANDRÁS GÁCS, PETER SZIKLAI, AND ZSUZSA WEINER Abstract. In this paper we prove that a set of points (in a projective

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Low-Power Cooling Codes with Efficient Encoding and Decoding

Low-Power Cooling Codes with Efficient Encoding and Decoding Low-Power Cooling Codes with Efficient Encoding and Decoding Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Hengjia Wei School of Physical and Mathematical Sciences, Nanyang Technological

More information

Lecture 4: Proof of Shannon s theorem and an explicit code

Lecture 4: Proof of Shannon s theorem and an explicit code CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated

More information

An Improvement of Non-binary Code Correcting Single b-burst of Insertions or Deletions

An Improvement of Non-binary Code Correcting Single b-burst of Insertions or Deletions An Improvement of Non-binary Code Correcting Single b-burst of Insertions or Deletions Toyohiko Saeki, Takayuki Nozaki Yamaguchi University ISITA2018 Oct. 29th, 2018 1 / 15 Background (1: Purpose) b-burst

More information

Edge Isoperimetric Theorems for Integer Point Arrays

Edge Isoperimetric Theorems for Integer Point Arrays Edge Isoperimetric Theorems for Integer Point Arrays R. Ahlswede, S.L. Bezrukov Universität Bielefeld, Fakultät für Mathematik Postfach 100131, 33501 Bielefeld, Germany Abstract We consider subsets of

More information

Lecture 17: Perfect Codes and Gilbert-Varshamov Bound

Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Maximality of Hamming code Lemma Let C be a code with distance 3, then: C 2n n + 1 Codes that meet this bound: Perfect codes Hamming code is a perfect

More information

International Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu

International Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu International Mathematical Forum, Vol 6, 011, no 4, 185-191 Square Designs on New Binary ( 3n 1, 3 n ) Codes Manjusri Basu Department of Mathematics University of Kalyani Kalyani, WB, India, Pin-74135

More information

Chapter 2. Error Correcting Codes. 2.1 Basic Notions

Chapter 2. Error Correcting Codes. 2.1 Basic Notions Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.

More information

A Characterization Of Quantum Codes And Constructions

A Characterization Of Quantum Codes And Constructions A Characterization Of Quantum Codes And Constructions Chaoping Xing Department of Mathematics, National University of Singapore Singapore 117543, Republic of Singapore (email: matxcp@nus.edu.sg) Abstract

More information

MT5821 Advanced Combinatorics

MT5821 Advanced Combinatorics MT5821 Advanced Combinatorics 1 Error-correcting codes In this section of the notes, we have a quick look at coding theory. After a motivating introduction, we discuss the weight enumerator of a code,

More information

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

A characterization of graphs by codes from their incidence matrices

A characterization of graphs by codes from their incidence matrices A characterization of graphs by codes from their incidence matrices Peter Dankelmann Department of Mathematics University of Johannesburg P.O. Box 54 Auckland Park 006, South Africa Jennifer D. Key pdankelmann@uj.ac.za

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

arxiv: v2 [math.co] 17 May 2017

arxiv: v2 [math.co] 17 May 2017 New nonbinary code bounds based on divisibility arguments Sven Polak 1 arxiv:1606.05144v [math.co] 17 May 017 Abstract. For q, n, d N, let A q (n, d) be the maximum size of a code C [q] n with minimum

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

Visual cryptography schemes with optimal pixel expansion

Visual cryptography schemes with optimal pixel expansion Theoretical Computer Science 369 (2006) 69 82 wwwelseviercom/locate/tcs Visual cryptography schemes with optimal pixel expansion Carlo Blundo a,, Stelvio Cimato b, Alfredo De Santis a a Dipartimento di

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with

More information

On Locating-Dominating Codes in Binary Hamming Spaces

On Locating-Dominating Codes in Binary Hamming Spaces Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and

More information

Lecture 2 Linear Codes

Lecture 2 Linear Codes Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of

More information

New Constructions for De Bruijn Tori

New Constructions for De Bruijn Tori New Constructions for De Bruijn Tori Glenn Hurlbert Garth Isaak Dedicated to the memory of Tony Brewster Abstract A De Bruijn torus is a periodic d dimensional k ary array such that each n 1 n d k ary

More information

New Inequalities for q-ary Constant-Weight Codes

New Inequalities for q-ary Constant-Weight Codes New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway

More information

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Pål Ellingsen paale@ii.uib.no Susanna Spinsante s.spinsante@univpm.it Angela Barbero angbar@wmatem.eis.uva.es May 31, 2005 Øyvind Ytrehus

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information